What’s the Internet: “nuts and bolts” view millions of connected computing devices: hosts Lecture 5: Data Communications and Internet Technology = end systems running network apps communication links Dr Hui Xiong Dr. Rutgers University router workstation server mobile local ISP fiber, copper, radio, fib di satellite transmission rate = regional ISP bandwidth routers: forward packets (chunks of data) company network Introduction What’s the Internet: “nuts and bolts” view protocols control sending, receiving of msgs router e.g., TCP, IP, HTTP, FTP, PPP communication infrastructure enables distributed applications: mobile local ISP Internet: “network of networks” Web, email, games, ecommerce, file sharing communication mm services lloosely l hierarchical h h l public Internet versus private intranet provided to apps: regional ISP Internet standards RFC: Request for comments IETF: Internet Engineering Task Force Connectionless unreliable connection-oriented reliable company network Introduction Introduction 1-3 What’s a protocol? What’s a protocol? human protocols: “what’s the time?” “I have a question” introductions a human protocol and a computer network protocol: … specific msgs sent … specific actions taken when msgs received, or other events 1-2 What’s the Internet: a service view workstation server Introduction 1-1 network protocols: 1-4 machines rather than humans Hi all communication activity in Internet governed by protocols Hi TCP connection response Got the time? protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt Introduction TCP connection req Get http://www.awl.com/kurose-ross 2:00 <file> time Q: Other human protocols? 1-5 Introduction 1-6 1 The network edge: A closer look at network structure: end systems (hosts): network edge: applications and hosts network core: run application programs e.g. Web, email at “edge of network” client/server model routers network of networks access networks, client host requests, receives service from always-on server e.g. Web browser/server; email client/server peer-peer model: physical media: communication links Introduction minimal (or no) use of dedicated servers e.g. Gnutella, KaZaA Introduction 1-7 The Network Core Network Core: Circuit Switching mesh of interconnected End-end resources reserved for “call” routers the fundamental question: how is data transferred through net? circuit switching: dedicated circuit per call: telephone net packet-switching: data sent thru net in discrete “chunks” link bandwidth, switch capacity dedicated resources: no sharing circuit-like (guaranteed) performance call setup required Introduction pieces allocated to calls resource piece idle if Introduction 1-9 1-10 Circuit Switching: FDM and TDM Network Core: Circuit Switching network resources (e.g., bandwidth) divided into “pieces” 1-8 Example: dividing link bandwidth FDM into “pieces” frequency division time division 4 users frequency not used by owning call time (no sharing) TDM frequency Introduction 1-11 time Introduction 1-12 2 Network Core: Packet Switching each end-end data stream divided into packets user A, B packets share network resources each packet uses full link bandwidth resources used as needed Bandwidth division into “pieces” Dedicated allocation Resource reservation Packet Switching: Statistical Multiplexing resource contention: demand can exceed amount available congestion: packets queue, wait for link use store and forward: packets move one hop at a time Node receives complete packet before forwarding Introduction 10 Mb/s Ethernet A aggregate resource C statistical multiplexing 1.5 Mb/s B queue of packets waiting for output link D E Sequence of A & B packets does not have fixed pattern Î statistical multiplexing. In TDM each host gets same slot in revolving TDM frame. Introduction 1-13 Packet switching versus circuit switching Packet switching versus circuit switching Packet switching allows more users to use network! Is packet switching a “slam dunk winner?” 1 Mb/s link Great for bursty data each user: 100 kb/s when “active” active 10% of time resource sharing simpler, no call setup Excessive E i congestion: i packet k d delay l and d lloss protocols needed for reliable data transfer, congestion control Q: How to provide circuit-like behavior? bandwidth guarantees needed for audio/video apps still an unsolved problem (chapter 6) circuit-switching: 10 users N users 1 Mbps link packet switching: with 35 users, probability > 10 active less than .0004 Introduction Introduction 1-15 Telecommunication networks L Takes L/R seconds to R transmit (push out) packet of L bits on to p link or R bps Entire packet must arrive at router before it can be transmitted on next link: store and 1-16 Network Taxonomy Packet-switching: store-and-forward R 1-14 R Example: L = 7.5 Mbits R = 1.5 1 5 Mbps delay = 15 sec Circuit-switched networks FDM TDM Packet-switched networks Networks with VCs Datagram Networks • Datagram network is not either connection-oriented or connectionless. • Internet provides both connection-oriented (TCP) and connectionless services (UDP) to apps. forward delay = 3L/R Introduction 1-17 Introduction 1-18 3 Access networks and physical media Residential access: point to point access Q: How to connect end systems to edge router? Dialup via modem up to 56Kbps direct access to router (often less) Can’t surf and phone at same time: can can’tt be “always always on on” residential access nets institutional access networks (school, company) mobile access networks ADSL: asymmetric digital subscriber line up to 1 Mbps upstream (today typically < 256 kbps) up to 8 Mbps downstream (today typically < 1 Mbps) FDM: 50 kHz - 1 MHz for downstream Keep in mind: bandwidth (bits per second) of access network? shared or dedicated? 4 kHz - 50 kHz for upstream 0 kHz - 4 kHz for ordinary telephone Introduction 1-19 Residential access: cable modems Introduction 1-20 Introduction 1-22 Introduction 1-24 Residential access: cable modems HFC: hybrid fiber coax asymmetric: up to 30Mbps downstream, 2 Mbps upstream network of cable and fiber attaches homes to ISP router homes share access to router deployment: available via cable TV companies Introduction 1-21 Cable Network Architecture: Overview Diagram: http://www.cabledatacomnews.com/cmic/diagram.html Cable Network Architecture: Overview Typically yp y 500 to 5,000 , homes cable headend cable distribution network (simplified) cable headend home cable distribution network (simplified) Introduction 1-23 home 4 Cable Network Architecture: Overview Cable Network Architecture: Overview FDM: server(s) V I D E O V I D E O V I D E O V I D E O V I D E O V I D E O D A T A C O N D T A R T O A L 1 2 3 4 5 6 7 8 9 Channels cable headend cable headend home cable distribution network cable distribution network Introduction 1-26 Wireless access networks wireless access network connects end system to router shared company/univ local area network (LAN) connects end system to edge router Ethernet: shared or dedicated link connects end system and router 10 Mbs, 100Mbps, Gigabit Ethernet LANs: chapter 5 via base station aka “access point” wireless LANs: 802.11b (WiFi): 11 Mbps router base station wider-area wireless access provided by telco operator 3G ~ 384 kbps • Will it happen?? WAP/GPRS in Europe Introduction mobile hosts Introduction 1-27 Home networks 1-28 Physical Media Typical home network components: ADSL or cable modem router/firewall/NAT Ethernet wireless access point cable modem Introduction 1-25 Company access: local area networks to/from cable headend home router/ firewall Ethernet Bit: propagates between transmitter/rcvr pairs physical link: what lies wireless laptops signals propagate in solid media: copper, fiber, coax Category 3: traditional phone wires, 10 Mbps Ethernet Category 5: 100Mbps Ethernet unguided media: signals propagate freely, e.g., radio wireless access point Introduction between transmitter & receiver guided media: Twisted Pair (TP) two insulated copper wires 1-29 Introduction 1-30 5 Figure 5-7 NIC Interface Card Physical Media: coax, fiber Coaxial cable: two concentric copper conductors bidirectional baseband: single channel on cable legacy Ethernet broadband: multiple channel on cable HFC Fiber optic cable: glass fiber carrying light pulses, each pulse a bit high-speed operation: high-speed point-to-point transmission (e (e.g., g 5 Gps) low error rate: repeaters spaced far apart ; immune to electromagnetic noise Introduction Figure 5-8 Unshielded Twisted Pair (UTP) Cable Introduction electromagnetic spectrum no physical “wire” bidirectional propagation environment effects: reflection obstruction by objects interference 1-32 Figure 5-9 Optical Fiber Cable Introduction 1-33 Physical media: radio signal carried in Introduction 1-31 1-34 Internet structure: network of networks Radio link types: terrestrial microwave e.g. up to 45 Mbps channels LAN (e.g., Wifi) 2Mbps, 11Mbps wide-area (e.g., cellular) e.g. 3G: hundreds of kbps satellite up to 50Mbps channel (or multiple smaller channels) 270 msec end-end delay geosynchronous versus low altitude Introduction 1-35 roughly hierarchical at center: “tier-1” ISPs (e.g., UUNet, BBN/Genuity, Sprint, AT&T), national/international coverage treat each other as equals Tier-1 providers interconnect (peer) privately Tier 1 ISP Tier 1 ISP NAP Tier-11 p Ti providers id s also interconnect at public network access points (NAPs) Tier 1 ISP Introduction 1-36 6 Tier-1 ISP: e.g., Sprint Internet structure: network of networks Sprint US backbone network “Tier-2” ISPs: smaller (often regional) ISPs Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs Tier-2 ISP Tier-2 ISP pays tier-1 ISP for connectivity to rest of Internet tier-2 ISP is customer of tier-1 provider Tier 1 ISP Locall and L d tieri 3 ISPs are customers of higher tier ISPs connecting them to rest of Internet Tier-2 ISP local ISP local ISP Tier 3 ISP Tier-2 ISP local ISP local ISP Tier-2 ISP local ISP Introduction Tier-2 ISP local local ISP ISP 1-39 1. nodal processing: check bit errors determine output link packet arrival rate to link exceeds output link capacity packets queue, wait for turn packet k t being b i ttransmitted itt d (delay) (d l ) A Tier-2 ISP local ISP Introduction 1-40 propagation B packets queueing (delay) 1-41 2. queueing time waiting at output link for transmission depends on congestion level of router transmission A Introduction Tier-2 ISP local ISP Four sources of packet delay packets queue in router buffers free (available) buffers: arriving packets dropped (loss) if no free buffers NAP Tier 1 ISP Tier 1 ISP Tier-2 ISP How do loss and delay occur? B local ISP Tier 1 ISP NAP Tier-2 ISP local ISP 1-38 a packet passes through many networks! local ISP Tier-2 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISP local local ISP ISP Introduction local ISP Tier 1 ISP Tier-2 ISP Internet structure: network of networks “Tier-3” ISPs and local ISPs last hop (“access”) network (closest to end systems) Tier 3 ISP Tier-2 ISPs also l peer privately with each other, interconnect at NAP Tier-2 ISP 1-37 Internet structure: network of networks local ISP NAP Tier 1 ISP Tier 1 ISP Tier-2 ISP Introduction Tier-2 ISP nodal processing queueing Introduction 1-42 7 An Example: Caravan analogy Delay in packet-switched networks 3. Transmission delay: R=link bandwidth (bps) L=packet length (bits) time to send bits into link = L/R s = propagation speed in medium (~2x108 m/sec) nodal processing queueing Introduction 100 km toll booth toll booth 100 km/hr Toll booth takes 12 sec to service a car (transmission time) car~bit; caravan ~ packet Q: How long until caravan is lined up before 2nd toll booth? propagation B ten-car caravan Cars “propagate” at p propagation p g delay y = d/s Note: s and R are very different quantities! transmission A 100 km 4. Propagation delay: d = length of physical link Time to “push” entire caravan through toll booth onto highway = 12*10 = 120 sec Time for last car to propagate from 1st to 2nd toll both: 100km/(100km/hr)= 1 hr A: 62 minutes Introduction 1-43 Packet loss 1-44 Protocol “Layers” Networks are complex! many “pieces”: hosts routers links of various media applications protocols hardware, software queue (aka buffer) preceding link in buffer has finite capacity when packet arrives to full queue, packet is pp (aka lost) dropped lost packet may be retransmitted by previous node, by source end system, or not retransmitted at all Introduction Question: Is there any hope of organizing structure of network? Or at least our discussion of networks? Introduction 1-45 1-46 Layering of airline functionality Organization of air travel ticket (purchase) ticket (complain) ticket (purchase) ticket (complain) ticket baggage (check) baggage (claim) baggage (check) baggage (claim baggage gates (unload) gate gates (unload) gates (load) gates (load) runway (takeoff) runway (land) takeoff/landing runway takeoff runway landing airplane routing airplane routing airplane routing departure airport airplane routing airplane routing airplane routing airplane routing intermediate air-traffic control centers arrival airport Layers: each layer implements a service via its own internal-layer actions relying on services provided by layer below airplane routing a series of steps Introduction 1-47 Introduction 1-48 8 Why layering? Internet protocol stack Dealing with complex systems: application: supporting network applications explicit structure allows identification, relationship of complex system’s pieces layered reference model for discussion modularization eases maintenance, updating of system change of implementation of layer’s service transparent to rest of system e.g., change in gate procedure doesn’t affect rest of system layering considered harmful? source datagram Hn Ht frame Hl Hn Ht M M M M transport network: routing of datagrams from network M link physical physical: bits “on the wire” Introduction Hl Hn Ht M M Hn Ht M Hl Hn Ht M application transport network link physical M Hl Hn Ht M network link physical Hn Ht M Hl Hn Ht M 1-50 IP Addressing: introduction M router Introduction 223.1.1.1 identifier for host, router interface interface: connection between host/router and physical link Ht PPP, Ethernet 1-49 switch Hn Ht physical neighboring network elements IP address: 32-bit Hl Hn Ht destination link IP, routing protocols link: data transfer between Encapsulation application transport network link physical transport: host-host data transfer TCP, UDP source to destination Introduction message segment Ht application FTP, SMTP, STTP router’s typically have multiple interfaces host may have multiple interfaces IP addresses associated with each interface 223.1.2.1 223.1.1.2 223.1.1.4 223.1.1.3 223.1.3.27 223.1.2.2 223.1.3.2 223.1.3.1 223.1.1.1 = 11011111 00000001 00000001 00000001 223 1 1 Introduction 1-51 IPv6 223.1.2.9 1 1-52 MAC Addresses and ARP Initial motivation: 32-bit address space soon 32-bit IP address: to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS network-layer address used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address: Introduction 1-53 48 bit MAC address (for most LANs) burned in the adapter ROM Introduction 1-54 9 LAN Address (more) Elements of a wireless network MAC address allocation administered by IEEE manufacturer buys portion of MAC address space (to assure uniqueness) Analogy: network infrastructure ((a)) MAC address: dd like lik Social S i lS Security it N Number b (b) IP address: like postal address MAC flat address ➜ portability wireless hosts laptop, PDA, IP phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility can move LAN card from one LAN to another IP hierarchical address NOT portable depends on IP subnet to which node is attached Introduction Introduction 1-55 Elements of a wireless network Elements of a wireless network base station wireless link typically connected to network infrastructure 1-56 wired network relay - responsible for sending packets between wired network and wireless host(s) in its “area” e.g., cell towers 802.11 access points Introduction typically used to network infrastructure Introduction 1-57 Multimedia, Quality of Service: What is it? 1-58 MM Networking Applications Multimedia applications: network audio and video (“continuous media”) Classes of MM applications: 1) Streaming stored audio and video 2) Streaming live audio and video 3) Real-time interactive audio and video QoS network provides application with level of Jitter is the variability of packet delays within the same packet stream performance needed for application to function. Introduction connect mobile(s) to base station also used as backbone link multiple access protocol coordinates link access various data rates, transmission distance 1-59 Fundamental characteristics: Typically delay sensitive end-to-end delay delay jitter But loss tolerant: infrequent losses cause minor glitches Antithesis of data, which are loss intolerant but delay tolerant. Introduction 1-60 10 Streaming Multimedia: Client Buffering Streaming Stored Multimedia Streaming: media stored at source transmitted to client streaming: client playout begins before all data has arrived constant drain rate, d variable fill rate, x(t) buffered video timing constraint for still-to-be transmitted data: in time for playout Client-side buffering, playout delay Introduction 1-61 Streaming Multimedia: client rate(s) compensate for network-added delay, delay jitter Introduction 1-62 What is network security? 1.5 Mbps encoding Confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver decrypts message A th ti ti Authentication: sender, d receiver i wantt tto confirm fi identity of each other Message Integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection Access and Availability: services must be accessible and available to users 28.8 Kbps encoding Q: how to handle different client receive rate capabilities? 28.8 Kbps dialup 100Mbps Ethernet A: server stores, transmits multiple copies of video, encoded at Introduction different rates Introduction 1-63 Friends and enemies: Alice, Bob, Trudy 1-64 There are bad guys (and girls) out there! well-known in network security world Bob, Alice (lovers!) want to communicate “securely” Trudy (intruder) may intercept, delete, add messages Q: What can a “bad guy” do? A: a lot! eavesdrop: intercept messages actively insert messages into connection impersonation: can fake (spoof) source address Alice Al ce data channel secure sender Bob data, control messages i packet in k t ((or any fi field ld iin packet) k t) hijacking: “take over” ongoing connection by removing sender or receiver, inserting himself in place denial of service: prevent service from being used by others (e.g., by overloading resources) secure receiver data more on this later …… Trudy Introduction 1-65 Introduction 1-66 11 Firewalls Firewalls: Why firewall isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others. prevent denial of service attacks: SYN flooding: attacker establishes many bogus TCP connections, no resources left for “real” connections. prevent illegal modification/access of internal data. e.g., attacker replaces CIA’s homepage with something else allow only authorized access to inside network (set of authenticated users/hosts) two types of firewalls: application-level packet-filtering public Internet administered network firewall Introduction Virtual private network (VPN) is the fourth WAN alternative. VPN communications are secure. The VPN client software encrypts, or codes, the original messages so that its contents are hidden. A VPN uses the Internet or a private internet to create the appearance of private point-to-point connections. Virtual private networks offer the benefit of point point- A VPN uses the public Internet to create the to-point leased lines, and they enable remote access, both by employees and by any others who have been registered with the VPN server. appearance of a private connection. A connection called a tunnel, is a virtual pathway over a public or shared network from the VPN client to the VPN server. 1-69 Introduction 1-70 Figure 5-19 Remote Access Using VPN: Apparent Connection Figure 5-18 Remote Access Using VPN: Actual Connections Introduction 1-68 Virtual Private Network (Continued) Virtual Private Network Introduction Introduction 1-67 1-71 Introduction 1-72 12 Figure 5-20 Wide Area Network Using VPN Criteria for Comparing Network Alternatives Many different computer networking alternatives are available, each with different characteristics. There are three types of costs that need to be considered. Introduction Setup costs include the costs of acquiring transmission lines and necessary equipment, such as switches, routers, and access devices. Operational costs include lease fees for lines and equipment, charges of the ISP, the cost of ongoing training, etc. Maintenance costs include those for periodic maintenance, problem diagnosis and repair, and mandatory upgrades. 1-73 Criteria for Comparing Network Alternatives (Continued) Introduction 1-74 Introduction 1-76 Figure 5-21 Criteria for Comparing Networking Alternatives There are six considerations with regard to performance: Speed Latency Availability y Loss rate Transparency Performance guarantees Other criteria to consider when comparing network alternatives include the growth potential (greater capacity) and the length of contract commitment. Introduction 1-75 Domain Name System Domain Name Registration IP addresses are useful for computer-to-computer communication, but they are not well suited for human use. The purpose of the domain name system (DNS) is to for administering the registration of domain names. ICANN does not register domain names itself; convert user-friendly names into their IP addresses. instead it licenses other organizations to register names. Any registered, valid name is called a domain name. The process of changing a name into its IP address is ICANN is also responsible for managing the called resolving the domain name. name resolution system. Every domain name must be unique, worldwide. To ensure duplicate domain names do not occur, an agency registers names and records the corresponding IP addresses in a global directory. Introduction ICANN is a nonprofit organization that is responsible The last letter in any domain name is referred to as the top-level-domain (TLD). 1-77 domain In the domain www.icann.org the top level domain is .org Introduction 1-78 13 Domain Name Resolution (Continued) Domain Name Resolution (Continued) Domain name resolution is the process of converting a domain name into a public IP address. A uniform resource locator (URL) is a document’s address on the Web. The process starts from the TLD and works to the left across the URL. URLs begin with a domain and then are followed by p data that locates a document with that optional domain. As of 2005, ICANN manages 13 special computers called root servers that are distributed around the world. Thus, in the URL www.prenhall.com/kroenke , the domain name is www.prenhall.com , and /kroenke is a directory within that domain. Each root server maintains a list of IP addresses of servers that each resolve each type of TLD. Introduction Introduction 1-79 1-80 Figure 5-25 Top-Level Domains, 2005 Domain Name Resolution (Continued) Domain name resolution proceeds quickly because there are thousands of computers called domain name resolvers that store the correspondence of domain names and IP addresses These resolvers reside at ISPs, academic institutions, large companies, government organizations, etc. For example, example if a domain name solver is on your campus and whenever anyone on your campus needs to resolve a domain name, that resolver will store, or cache, the domain name and IP address on a local file. • When someone else on the campus needs to resolve the same domain name, the resolver can supply the IP address from the local file. Introduction Introduction 1-81 Internet History Internet History 1961-1972: Early packet-switching principles 1972-1980: Internetworking, new and proprietary nets 1961: Kleinrock - queueing theory shows effectiveness of packetswitching 1964: Baran - p packetswitching in military nets 1967: ARPAnet conceived by Advanced Research Projects Agency 1969: first ARPAnet node operational 1970: ALOHAnet satellite 1972: ARPAnet demonstrated publicly NCP (Network Control Protocol) first host hosthost protocol first e-mail program ARPAnet has 15 nodes Introduction 1-83 network in Hawaii 1973: Metcalfe’s PhD thesis proposes Ethernet 1974: Cerf and Kahn architecture for interconnecting networks late70’s: proprietary architectures: DECnet, SNA, XNA late 70’s: switching fixed length packets (ATM precursor) 1979: ARPAnet has 200 nodes 1-82 Cerf and Kahn’s internetworking principles: minimalism, autonomy no internal changes q to required interconnect networks best effort service model stateless routers decentralized control define today’s Internet architecture Introduction 1-84 14 Internet History Introduction: Summary 1990, 2000’s: commercialization, the Web, new apps Early 1990’s: ARPAnet decommissioned 1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995) early 1990s: Web hypertext [Bush 1945, Nelson 1960’s] HTML, HTTP: Berners-Lee 1994: Mosaic, later Netscape late 1990’s: commercialization of the Web Covered a “ton” of material! Internet overview what’s a protocol? network edge, core, access network packet-switching versus circuit-switching Internet/ISP structure performance: loss, delay layering and service models history Late 1990’s – 2000’s: more killer apps: instant messaging, P2P file sharing network security to forefront est. 50 million host, 100 million+ users backbone links running at Gbps Introduction Corporation during the 1990s, once said that humans are incapable of thinking exponentially. Instead, when something changes exponentially, we think of the fastest linear change we can imagine and extrapolate from there. His point was that no one could then imagine how much growth there would be in magnetic storage and what we would do with it. We have all witnessed exponential growth in a number of areas: Internet connection, Web pages, and the amount of data accessible on the Internet. Introduction What are the new opportunities? What are the new threats? How will our competition react? How should we position ourselves? How should we respond? Understand that technology does not drive people to do things they’re never done before, no matter how much the technologists suggest it might. Introduction 1-88 though those six people do exist, we don’t know who they are. Today, in fact with the Internet, the number may be closer to three people than five or six. Suppose S you wantt tto meett your university’s i it ’ Even worse, we often don’t know who the person is with whom we want to connect. Most successful f l professionals f l consistently l build ld president. The problem with the six-degree theory, is that even with the idea that everyone on earth is connected to everyone else by five or six people. thinking about ubiquitous and cheap connectivity that is growing exponentially. Reflection Guide–Human Networks Matter More (Continued) The Hungarian writer, Frigyes Karinthy, came up Every business, every organization, needs to be 1-87 Reflection Guide–Human Networks Matter More 1-86 Problem Solving Guide–Thinking Exponentially Is Not Possible, but… (Continued) Nathan Myhrvold, the chief scientist at Microsoft follow! Introduction 1-85 Problem-Solving Guide–Thinking Exponentially Is Not Possible, but… You now have: context, overview, “feel” of networking more depth, detail to The president has a secretary who acts as a gatekeeper. If you walk up to that secretary and say, “I’d like a half hour with President Jones,” you’re likely to be palmed off to some other university administrator. What else can you do? Introduction 1-89 personal human networks. They keep building them because they know that somewhere there is someone whom they need to know or will need to know. They meet people at professional and social situations, collect and pass out cards, and engage in pleasant conversation (all part of a social protocol) to expand their networks. Introduction 1-90 15